High availability is an increasingly important requirement for enterprise systems, often valued more than performance. Systems designed for high availability typically use redunda...
Nidhi Aggarwal, Parthasarathy Ranganathan, Norman ...
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
We describe the implementation of an enterprise monitoring system that builds on an ontology-based information extraction (OBIE) component applied to heterogeneous data sources. T...
Abstract. In this paper, we propose a heterogeneous committee machine for face processing including face detection and recognition. Our proposed system consists of two components, ...
Kim-Fung Jang, Ho-Man Tang, Michael R. Lyu, Irwin ...
Intelligent tutoring systems (ITS) provide individualised instruction. They offer many advantages over the traditional classroom scenario: they are always available, non-judgement...
Scott P. Overmyer, Hamid Gholam Hosseini, Chao Fan...